What To Do When You Get Spam

When you go to your mailbox and find pieces of junk mail mixed in with important correspondence, you throw it out. It is a mild nuisance and you probably don't even give it a second thought. Unfortunately, most people do the same when spam arrives in their inbox. They just delete it.

While that does get rid of an individual email, more needs to be done to control what can become an overwhelming problem. Liken spam to cockroaches; see one in your cabinet and you know that you likely have an infestation that needs to be dealt with swiftly.

To begin with, do not respond to the spam ? ever. There are usually two ways that spam recipients make this mistake. First is the opt-out clause that appears at the bottom of the email. It appears to be a legal statement giving you the right to remove yourself from this mailing list. Unless you legitimately authorized the company to send you mail, in which case this is not spam, do not follow this link. Most often this link is simply a way for the spammers to identify your email address as valid. Now they can sell your address to other spammers and thank you for making their work easier by continuing to send you the spam you didn't want in the first place.

The second manner in which this error occurs is when, out of total frustration, you reply to the sender with a firm statement of your disgust. This usually happens when the spam is pornographic material and despite your best efforts, keeps appearing in your inbox. Sometimes the reply will not work because the sender's email address is a fake one and it will just bounce back to you as undeliverable. Count yourself lucky because the alternative means that they now have a confirmation of your address.

Next, read the email header. The header contains the full path of computers through which the email passed to get to you. Most pieces of email pass through at least four computers ? the spammer's, their ISP, your ISP, and finally yours. Since the stated from address is usually a fake one, this is the most reliable way to track down the spammer's ISP, at the very least.

Each computer that the spam travels through will add lines to the header stating who they are, who the mail came from, and where they are sending it. Headers can seem complicated, but in most cases you will be able to at least recognize other ISPs. If your mail is through Yahoo and you see "juno.com" in the mix, then you know that you can report the spam to Juno.

When reporting spam, you will need to cut and paste the full header path into the email to give the experts the opportunity to track down the offender. To read an email header, you typically just right click on the email and then choose properties, options, or header depending on which email program you are using.

Finally, forward the spam to a number of authorities. The first would be the spammer's ISP. If you cannot tell who that may be, send the spam to your ISP. Additionally, several websites are available to help you report spam, like spamcop.net.

Second, forward the spam to the Federal Trade Commission at uce@ftc.gov. While they will not take action on your behalf, they will add the spam to a database compiled on known UCE (unsolicited commercial email).

If the spam is a "419 Scam", or Nigerian Advance Fee Fraud, fax a copy of the email and its headers to the United States Secret Service. You will know this spam when you read it ? an exiled African leader of some sort needs your help and bank account information. These scams have defrauded many and need to be taken seriously.

Now you may delete the spam.

Lewis Leake is the webmaster of emailcash.com. There you will find articles, resources, books and product reviews on eMail Marketing Strategies and Tactics. You will also find a number of articles on SPAM and how to prevent it. Get Your FREE Mini-Report emailcash.com

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

The Anti Spam Challenge ? Minimizing False Positives

Email is the quintessential business communication tool, so when it... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

What To Do When You Get Spam

When you go to your mailbox and find pieces of... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Is Your Website Blacklisted?

A blacklist, as the name implies, is a list of... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Edating Readers

One of our Australian clients sent out a campaign using... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

What to Do to Avoid Getting Banned

How would you feel if you found a link on... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

Avoiding the Spam Trap: Get Your Message Delivered!

Your message is not being delivered.If you send emails to... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

reliable maid service Winnetka ..